Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Showing posts with label Tech Home. Show all posts
Showing posts with label Tech Home. Show all posts

Wednesday 17 December 2014

Basic Security Tips for Bloggers and Begginers

Wednesday 17 December 2014 - 0 Comments



Recently, Mat Honan’s frightening account of how hackers destroyed his digital life has been making rounds online, scaring nearly everyone who reads it.

Basically, Honan’s digital presence was all but destroyed after hackers managed to delete his Google Account, wipe his iPhone, iPad and Macbook and deface his Twitter account. The reason for the attack, according to one of the people behind it, was “lulz” and to play around with a three-character Twitter name.

Honan’s position as senior reporter at Gizmodo did nothing to provoke nor protect him from the attack. Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.

Though he acknowledges his mistakes the affair, most sharply his failure to backup critical data (which everyone should have), his sharpest barbs were for Amazon and Apple, who’s security policies made the hack possible.

Though Amazon and Apple have responded by updating their security policies, hopefully to prevent future attacks along the same vector, many have been wondering what they can do to strengthen their security online.
The truth is, no security is perfect and anyone who is a valuable enough target can be bit. But you can make yourself a more difficult target and someone who can not be trivially exploited and you can minimize the damage an attacker can do.
With that in mind, here are a few mostly common sense steps that can get you started to being more secure online.

  • Make or Write Smart Password Using Letter, Numerical, Upper & Lower Case: 

A good password should be long, at least eight characters, easy to remember and contain a combination of lower case letters, upper case letters, numbers and symbols. Most importantly, it should not be a word found in the dictionary nor any variation of one.

Also, you should never reuse a password for more than one site and you should never write your passwords down.

If this sounds like a lot, it is. It’s too much for pretty much anyone to do without help.
One solution is to use a device known as a cipher to generate passwords on the fly. For example, you can look at the domain name of the site and generate a password based on it. Basically, to do this, you look at the site you’re at and create a hard-to-guess password from the domain.

For example, facebook might have a password of g1s@v3r$ if you use the cipher of looking at your keyboard and writing the first four letters of the domain “face” using the keys one to the right of the real ones and then breaking up the letters with the numbers 1-4 alternating with the shift function every other time. Look at your keyboard (US) if you are unclear.

Alternatively, you can also use services like LastPass to help you generate, store and automatically fill in passwords. However, these services are a trade off between random, difficult passwords and a new central point of failure. As long as the service itself is secure, you’re most likely fine.

  • Two Factor Authentication Attempt:

Matt Cutts at Google recommended this strongly on his blog and I agree.
Two factor authentication simply means that you need two forms of authentication to log into a site. However, they have to be two different forms (not simply two passwords).

One form, obviously, is your password (something you know) but the other is usually something you have. These days, your cell phone is the most likely thing as many services, such as PayPal and Google, will send you a text that you have to repeat to log in. Google also, has its own app for most phones and that’s how LastPass handles its two-factor authentication.

This is an incredibly powerful tool because, even if your password is compromised, which Honan’s attack shows it can be easily in some cases, your account is not. It’s very unlikely, barring drastic steps, someone is going to have both your cell phone and your password. One or the other is possible, even likely, but not both.

If your account offers two factor authentication, turn it on as soon as possible. It’s a very powerful step.


  • Personal Information:

A lot of sites will ask you to create backup security questions in case you forget your password. Common ones involve things such as your favorite pets name or the street you grew up on.
The problem is that many of these things can be trivially researched. However, you can beat this by simply lying on the questions.

After all, there’s no rule that you be honest, just that you remember your answer. If you’re asked for your favorite pet, give the name of your childhood imaginary pet. Ideally, your answers should be related enough to the questions to remind you of what you said, but far enough off base that it’s not trivially guessed.


  • Credit Card Common Sense Tips:

Credit cards are like passwords, ideally they should not be used more than once and should never be stored. As Honan’s attack showed, even if they aren’t used for financial gain, they can still be used to open up exploits into other accounts.

If you have a bank or a credit card company that will issue single-use credit card numbers, use them. They are immensely powerful. If you don’t, try to avoid storing your credit card numbers and especially about storing one number across multiple accounts.

It might be annoying to re-enter your credit card data every time you want to buy a book on Amazon, but it could be what saves you from a minor hack becoming a major one.


  • Bottom Line:

In the end, security is about the trade off between protection and convenience. Most of the things that make you more secure will also take up more of your time.

It’s really annoying to have to find your phone every time you want to log in to your gmail or you have to enter a complex password that’s difficult to guess. Life would be much easier if we didn't have to deal with those things.

But, of course, that isn't practical. The problem is that others don’t value your life, your privacy, your information or your work. They would happily destroy it all, whether it’s for profit, a vendetta or just “lulz”, there are individuals who will not think twice about destroying your world.

If you realize that and that no one is too unimportant to be a target, then it only makes sense to take precautions now. Today’s hassle may save you from tomorrow’s attack.

Tuesday 16 December 2014

Finally! Vivo X5 Launched , priced in India at Rs 32 980

Tuesday 16 December 2014 - 0 Comments




Chinese smartphone company X5 vivo Max India launched the world's most slim phone has vivo. Vivo with this phone which launched its second smartphone vivo Y22, vivo X 3S, including vivo Y15 and Y22 vivo.

X5 Max price of their new phones in India vivo is kept at 32 980. This phone is 4.75 millimeters thick, that it is by far the most slim mobile handset. 5-inch full HD Super Amoled display the phone, 64-bit processor Octa core Qualcomm Snapdragon 615 , 2 GB of RAM, expandable to 16 GB inbuilt features like memory. It runs on Android KitKat.

Vivo X5 in China this month, was announced on December 10. Vivo in India have joined hands with the Viacom 18 Solutions integrated network. vivo Import your phone is currently in India  but hopefully they will also make calls to India in 3 years.

Whatsapp Now on Computer!!!!




Soon you will be able to speak on your computer even Whatsapp. It looks like the Whatsapp your messaging service is preparing to get on the web.

The only news coming from the Messaging app Mr. Dyorov Telegram-Founder Powell told Tech Crunch that the feeling that they have been working on since Whatsapp Whatsapp its web version of their web developer Higher Tried to. However Whatsapp information from any web version but a recent search of Android World dot NL Powell has fanned fears. Whatsapp the latest updates in the code Whatsapp Web is written. In addition, the code in the web service to track logging and online Stetson has written about.
However, it can not be taken as definitive evidence that Whatsapp but it seemed to work on the team is engaged in a web functions.

One Plus Now Hit Banned in India




According to reports, the Delhi High Court is now a Chinese company put a temporary ban. The company is one plus. The Delhi High Court has imposed ban on the appeal of Micromax. Micromax with Cyanogen at one plus the exclusive rights violations alleged. After the High Court hearing on the case of one plus the smartphone market in India, has ordered a ban on the sale and shipping.

The one plus one plus one smartphone in India on December 2, was launched. Based u soon Cyanogen Micromax phone is its series to India. The Micromax say, 'He has a contract with one plus Cyanogen violation of the agreement to sell your phone is illegal in India. Plus, if one is not stayed so Micromax smartphone sales can cause considerable damage. "

One plus point is that at the beginning of this year and the trademark license agreement Cyanogen a Collaboration agreement was signed, according to which he Cyanogen anywhere in the world except China can use the trademark and software. However, in India also launched one plus days before the agreement was over 15.

Earlier Cyanogen has announced that the agreement with Micromax in India that one plus one will not support the phone. The first Ericson Cyanogen and pulls the case of one plus the court imposed a ban on Chinese company Xiaomi. However, the Court of Xiaomi January 8 is allowed to sell its Qualcomm-based handsets.

Sunday 14 December 2014

Size Zero Craze Continues to Smartphones

Sunday 14 December 2014 - 0 Comments



The fastest, biggest screen, the best camera ... after all mobile phone companies in the race, is slim. Soon 4 new phones are going to be tough to match. Learn these 4 phone features:

Vivo X-5 (4.75 mm)



The company's entry into India to China on December 15 going vivo. Earlier this week, just before the company in China has launched its latest phone vivo x 5 Max, which is just 4.75 mm thick, that it is by far the most slim mobile handset. With this phone will debut in India. 5-inch full HD Super Amoled display the phone, 64-bit processor core Qualcomm Snapdragon 615 Okta, 2 GB RAM, expandable to 16 GB inbuilt features like memory. It runs on Android KitKat. In China, the price will be Rs 30 per rupee. Tuesday will know what the pricing for India adopts vivo.

Oppo R-5 (4.85 mm)



Opo is also Chinese and a few days before he brought the slim phones R5 title was taken from a Chinese company, although Jioni vivo broke the record sometime soon. Opo R5 Showcase on October 29, was the first in Singapore. This month it will be for sale in India and its price is expected to be in the range of Rs 25,000-30,000. Aluminium alloy instead of the company has a strong stainless steel body R5, which the band is not. Opo said ultra thin phone that does not have the strong body remains in the risk of damage, which he has been away from steel. The 5.2 inch Amoled display, 2 GB RAM, 16 GB inbuilt memory, and a 5 megapixel camera features like 13.

Gionee Elife S 5.1 (5.1 mm)



Chinese company's 5.5 millimeters Gionee Elife earlier when he was introduced to the world by a long way to the slim phone. 5.1 As he's brought his successor, but now is not the slim Jioni Seksiyest call him by his side, giving the title. Week for sale in India has already been introduced. This phone is available at Rs 18 999 5.1 mm body. Metal frame, with glass body looks quite stylish. 4.8 inch Amoled display, 1.7 GHz, plus Hz Octa core processor, and a  16 GB GB of RAM, inbuilt memory, Android KitKat features such as user interfaces are based Amigo 2.0.

Samsung Galaxy A-7 (6.3 mm approximately)



Samsung Galaxy design by Alpha phone was answered on the precipice of his criticism. Now the industry is such news that soon he is going to bring far the most slim phones. The Chinese call is not as thin as the raging war of slim but its thickness is significantly reduced by Samsung. According to reports, it was leaked on the Internet Galaxy A7 thickness of 6.3 mm, which is by far the most slim phones are expected. According to Liks pointers in addition to the 5.5 full HD display, 64-bit Octa core processor, 2 GB RAM, 16 GB inbuilt memory and will be equipped with features such as Android Katkat. Although Samsung has not officially informed about this.

Do This Simple Tips! Your Smartphone Battery will Work For a Long time


DBT

The smartphone has a lot to do and the problem of why we ended up in front of the battery leads. If you think that your smartphone battery fast Tan is speaking, you can try these methods:

1. Keep it Turn Off



  • Bluetooth, Wi-Fi

Turn on Wi-Fi only smartphone, when you want to use. Wi-Fi is also on going out of range, the phone looks for Wi-Fi signal and battery costs will be. Very rarely do people use GPS. Keep it to one of these. Keep it on all the time is also spent batteries. Wi-Fi is a way off: Settings-Wireless Settings-WiFi-off

  • Animation

If the battery is the most important thing for you, then turn off the animation in all applications. Style will be reduced, but will increase battery life. Follow this method to: Settings-Developer Options-Drawing let go of all the animation either to reduce or Animation Scale.

  • Mobile Data

Take the battery to be completely closed because the phone is not possible to charge, so be sure to Mobile Data Off. The phone will go on, the Internet will not work-related services.


  • Location Services

The (Settings-Locations Services) to go into the box to remove the tick mark. Services will be on location, trying to track the location of the phone will spend the battery. When needed, you can location on the service for a while.

2. The lower the as you can These All



  • Screen Brightness

Most battery eats screen. Screen, the bigger, the higher will be the bright and high resolution, the more power it needs. If your phone is the screen brightness to the auto mode, then use it, do not keep the brightness around 50 per cent. The battery will cost less. It is an advantage and that it will have less emphasis on your eyes. Especially in times of need such strong sunlight can increase the brightness when viewing photos or videos.


  • Screen timeout

Screen timeout means- nothing of the screen will automatically light how long. The lower the screen timeout on your phone, the battery will last much longer. To reduce it to the phone, go to: Settings-Sound & Display-Screen timeout


  • The use of cameras and video

When the phone's battery is low, then the deliberate use of camera and video. These two things will require power. When the phone began to feel more warm, to understand that the battery is being spent rapidly and now needs to rest.

3. Things to avoid



  • Vibration

Ringtones to phone vibrates more than the voice has to be strong, so if you do not have to keep the phone on vibration mode. Disable it and hold. Follow this method to: Settings-Sound and Display-PhoneVibrate


  • Live Wallpaper

Fish floating on the screen of the phone or any other live wallpaper to-use, then you should assume that the battery would cost too much. Instead of a dark color would be nice to wallpaper photos.


  • Widgets

Widgets icon they are larger than normal size, which take up more room on the screen of your phone - like the weather or the Facebook and Twitter Widgets tell. Widgets automatically updated every battery feed themselves. Of application icons on the home screen of the phone Do not crowd. Sometimes use the app, do not keep them on the home screen, but went in the Open menu.


  • Two Antivirus

Do not use the phone two Antivirus. Some people think that the two Antivirus will make their phone more secure, but it is not. It will make your phone battery will continue to be sluggish.

4. Check Always these things



  • How much battery Use

Go to Phones Settings (Settings-Battery Use) to see which applications are spending so much battery. If the application without eating much battery, remove it from the phone.


  • 2G or 3G and 4G mode

So much so that you do not have plans 3G mobile company and your phone is running on 3G mode. Which mode is running on the phone, to the Check (Settings-More Settings-Mobile Networks-Network Mode / Preferred network type) visit and are not using the 3G or 4G, 2G mode Bring it. 3G or 4G are used if, but to a place where 3G or 4G service may not go so similar 2G mode, the battery cost will not find the phone 3G signal.

5. focus on application



  • Avoid unnecessary apps

These days is full of apps and even free, but that does not mean that you are downloading app poke. Download apps only work if you use some app is closed so you remove them from the phone. Downloading is easy to uninstall unnecessary applications, but what about those useless apps, which were already in the phone, but you do not ever use.

Android app version 4.0 and above has facilities Disable to: Settings-Application Manager-All tab. You do not use the app, press the Open button to Disable. If you do not see the option to Disable, then uninstall it before all the updates. Disable then try again. If you can not understand the service, they do not Disable, or the call may be wrong.


  • Properly Close

Application by pressing the Home button will not stop, they just go in Background spend and keep the battery. By then hit the back button to close the app continue until the app to get out of. Or use the Exit button.


  • Auto-update

Android phones are updated all day came App. Such updates to both the battery and data overshadowed. Auto Update to Off (Menu-Play Store-Settings-Auto Update apps) Go and Do not auto update set.


  • Use bookmarks

Ever noticed how your phone services are continually go on and do the sink? Facebook, Twitter, Gmail, Office Mail, Google Plus ... they spend all battery and data. If possible, download the app for Facebook and all these things rather than making use browser bookmarks.

(We also have to change the settings in the way, he has to call Android. Android phone may therefore also have different versions that your smartphone is a little different in the way of the process.)

Are You Yet Using Free Wi-Fi in Public Place! Read them carefully





New Delhi (India) Railway Station has recently been Wi-Fi enabled. Do you know that Wi-Fi at public places while your system and data-use are both at risk? What to do then? Wi-Fi at public places such as using some important settings in your computer and take advantage of this feature from the rest:

Hotel on, railway stations, coffee shops, etc. The public Wi-Fi networks are not as safe as you think. Among them is the password, even though you are a network share with the thousands which means that you are taking a risk. While working on the same network and steal someone's username and password to track what others are working on it, very easy to operate. Obviously, you do not want to take any chances. Here are some tell about the settings are any public Wifi networks while on the must-use, even if the network is password protected or not.

1. Turn off sharing


If you're at home, you file, folder, printer, or other things to share with others, but after coming over a public network like you to stop this kind of sharing so that no one can access your information. Follow this approach to the sharing of Windows:

- Start by going to the Control Panel Open the system.

- Network and Sharing Center, click on.

- Left side look up Change Advanced Sharing Settings. Click it.

- Come and give you a file and printer sharing is off. Network Discovery and Public Folder Sharing can also off.

2. Enable Firewall


Nowadays, most operating systems come with basic firewalls. Unnecessary local users to pry into your computer, it is a simple step to prevent. Use only will you have firewalls. Czech for Windows can thus: Control Panel> System and Security> Windows Firewall. Windows Firewall in the Control Panel option in many computers are seen. Make sure that your firewall is going on here. From here you can also decide which applications you want to access. The Control Panel> System and Security> Windows Firewall> Allow a program or feature go and edit it to your liking. Firewall does not mean that you have to keep on all escaped the danger, but it's always good to keep on.

3. Using "https" Enabled Sites For Transaction or         Browsing


Facebook, Gmail is "https"(Means Hyper Text Transfer Protocol and "S" means SECURE)on its own as many sites, but while working on someone else's site, or sensitive data or passwords must take the time to look at the address bar put. S Make sure that there is at http. If s is not immediately log out. Advice is that if credit card or banking jobs are related to the public Wi-Fi networks Do not Use. Sensitive to such things would be better at home.

4. Turn off Wi-Fi if Not Using It 


Safety of your computer every time you want and do not need the Internet to Use Wi-Fi to your place of. Every time without a Wi-Fi only if you keep the others, it increases the chances of your work Watch unsuspecting. Wi-Fi is off easy in Windows. For this you right-click on the wireless icon in the task bar and turn off Wi-Fi.

11 WordPress Security Tips For Beginners and Admins




WordPress is, without a doubt, one of the most popular publishing platforms. More than 70 million websites from around the world use WordPress to run their blogs, including big names like The New York Times, CNN, Mashable, and eBay. WordPress is one of the easiest and most powerful content management systems (CMS) in existence today, but as with any widely used software, its popularity can make it a target for hackers. Fortunately, there are a few easy things you can do to secure your site from the majority of attacks. Here are seven WordPress security tips to keep in mind.

1. Get rid of the “admin” user.

If there is one golden rule of WordPress security, it is probably this: never use the default “admin” user. Obviously, on any WordPress site you’ll have at least one user with “Administrator” privileges, but make sure that username is something different than the default “admin.” By leaving the defaults in place, you make it easier for hackers to guess your password and gain access to your site.

If you DO currently have a user named “admin” on your WordPress site, simply set up a new user with a unique name and password, and give them administrative access. Then, login as that new user and delete the old “admin” user. Be sure to attribute any old content that was posted by the “admin” user to your new username.

2. Use strong, unique passwords.



This is true for ANY site you use across the Internet. You’ve probably heard news stories about mass data breaches by Russian crime rings and the Heartbleed security bug. Choosing strong, unique passwords for each site you register for, and changing them regularly, is one of the best things you can do to stay safe and secure online. Does the thought of remembering all of those passwords make you crazy? Use a secure password manager like LastPass to make sense of the madness and help you generate unique passwords for the sites you use.

3. Simplify WordPress security with a powerful tool.

WordPress security is complex, and many of the more technical aspects are beyond what an average user might feel comfortable implementing themselves. Luckily, there are handy tools and security plugins built to simplify this process. Use a plugin like iThemes Security or BulletProof Security to secure your site from most attacks in just a few steps.

4. Stay up to date.

One of the most important things you can do with any type of software, in terms of security, is keep it up to date. Software developers are constantly releasing security patches and updates, and WordPress is no exception. Make sure you’re running the latest version of WordPress, and keep plugins up-to-date. It typically only takes a few clicks and less than a minute to do so

5. Keep plugins to a minimum.

The more bells and whistles, the more chances there are that something can break. Extra plugins, even inactive ones, can become a security risk if they become outdated. In the world of WordPress, typically when something goes wrong with your site, the problem can be traced back to an old plugin or multiple plugins that don’t play nice with each other. Delete unused plugins and keep the number of plugins you have installed on your WordPress site to just the essentials.

6. Use a secure hosting company.

Your site is only as secure as the server it’s hosted on. Look for hosting companies that make security a top priority and offer support for the latest PHP and MySQL versions, as well as firewalls and intrusion detection systems. In the event that your site gets hacked, does your hosting provider offer support for that? If not, it may be time to look for another hosting company.

7.  Never use “admin” as your username

Earlier this year, there was a spate of brute-force attacks launched at WordPress websites across the web, consisting of repeated login attempts using the username ‘admin’, combined with a bunch of common passwords.

If you use “admin” as your username, and your password isn’t strong enough (see #3), then your site is very vulnerable to a malicious attack. It’s strongly recommended that you change your username to something less obvious.

Until version 3.0, installing WordPress automatically created a user with “admin” as the username. This was updated in version 3.0 so you can now choose your own username. Many people still use “admin” as it’s become the standard, and it’s easy to remember. Some web hosts also use auto-install scripts that still set up an ‘admin’ username by default.

Fixing this is simply a case of creating a new administrator account for yourself using a different username, logging in as that new user and deleting the original “admin” account.

If you have posts published by the “admin” account, when you delete it, you can assign all the existing posts to your new user account.

8. Limit 'Login' Attempts

In the case of a hacker or a bot attempting a brute-force attack to crack your password, it can be useful to limit the number of failed login attempts from a single IP address.

Limit Login Attempts does just that, allowing you to specify how many retries will be allowed, and how long an IP will be locked out for after too many failed login attempts.

There are ways around this, as some attackers will use a large number of different IP addresses, but it’s still worth doing as an additional precaution.

9. Disable file editing via the dashboard

In a default WordPress installation, you can navigate to Appearance > Editor and edit any of your theme files right in the dashboard.

The trouble is, if a hacker managed to gain access to your admin panel, they could also edit your files that way, and execute whatever code they wanted to.

So it’s a good idea to disable this method of file editing, by adding the following to your wp-config.php file:

define( ‘DISALLOW_FILE_EDIT’, true );

10. Keep a "backup"

I can’t overemphasize the importance of making regular backups of your website. This is something that many people put off until it’s too late.

Even with the best security measures at your disposal, you never know when something unexpected could happen that might leave your site open to an attack.

If that happens you want to make sure all of your content is safely backed up, so that you can easily restore your site to its former glory.

The WordPress Codex tells you exactly how to backup your site, and if that seems like too much hard work, you can use a plugin such as WordPress Backup to Dropbox to schedule regular automatic backups.

11. Try to avoid free themes

We’re confident in the quality and security of our free themes. As a general rule though, it’s better to avoid using free themes, if possible, especially if they aren’t built by a reputable developer.

The main reason for this is that free themes can often contain things like base64 encoding, which may be used to sneakily insert spam links into your site, or other malicious code that can cause all sorts of problems, as shown in this experiment, where 8 out of 10 sites reviewed offered free themes containing base64 code.

If you really need to use a free theme, you should only use those developed by trusted theme companies, or those available on the official WordPress.org theme repository.

Note: The same logic applies to plugins. Only use plugins that are listed on WordPress.org, or built by a well-established developer.


Don’t Panic!
This may all sound pretty intimidating, especially if you’re a beginner. I’d like to point out that it’s not intended to scare anyone, it’s just important to discuss the topic of security regularly, as we want to make sure you stay one step ahead of the hackers!

You don’t have to do everything on this list (although it certainly wouldn’t hurt). Even if you just remove the ‘admin’ username and start using stronger passwords, your site will be that little bit safer.

Saturday 13 December 2014

Corning Gorilla Glass 4 launch in India

Saturday 13 December 2014 - 0 Comments





Mobile largest tension loss, because if it was broken or sticking to the screen, then the waste is expensive, expensive sets. When the new screen is extremely expensive. Fear not break, scratch, too, because of the beauty of the display on the screen by using the guards put the curtain. Strong display glass maker Corning and reduce tension in your being. He Grila Corning Glass has launched 4.

Yet Gorilla Glass 3 was the strongest glass, which is scratch resistance, the hand on the screen falling significantly reduces the risk of breakdown. Gorilla Glass 4 is much better, the mobile makers like you already have a thickness of the display, the Gorilla Glass 4, two times higher than the third generation will strengthen.

If companies want to display as the strength first, then 25 per cent thinner than Gorilla glass 3 display could use 4. The companies thin, but strong Gorilla glass screen at Level 3 or higher will be thick but more robust screen option.
Corning said that he found in the drop test when dropped from a height of one meter Gorilla avoid breaking glass 4 times 80 per cent, while ordinary soda glass broken every time. It was also the first phone that Samsung Galaxy Alpha is currently the Gorilla Glass 4 is used.



Xiaomi banned from selling, importing phones in India: Report




The Delhi High Court on Xiaomi Chinese company selling smartphone in India has imposed a temporary ban. The case is still in court final judgment.
Spicy IP Ericsson India against Xiaomi report, the court ordered a trial.

Ericsson's Standard Isendahl Patents (SEP) is based on the lawsuit. Court Xiaomi selling phones that violate these Patents advertising, and to import is banned. However, it is not clear that the effect of the Xiaomi smartphones sold in India have a certain phone.

Court Rules IPR customs authorities, in 2007 ordered to stop the import. Court told local commissioners Xiaomi Explore the office is going to follow the order or not.

According to reports in the case of Xiaomi Ericsson Patents be the same case as Micromax, was against Jioni and Intex.

Micromax Delhi High Court had earlier ordered that use technology to Ericsson Patents price of their devices as a percent royalty to Ericsson.
Xiaomi Manu Jain, head of India told us that the company has not officially Ericsson or court. He said that India is a key market for the company's legal team Xiaomi media reports, will oversee the case. He emphasized that Xiaomi follow all laws and will settle disputes with Ericsson.

Now See offline video on YouTube app in India





YouTube in India has given a great feature. Now you can watch video on mobile without internet connection. Actually, you first need to download the Internet to see it after being offline and when you're not able to see the Internet.
YouTube If this feature will be helpful for those who have some time in the day and the time is not Wi-Fi, also will benefit them too much, because of the slow speed of their Internet connection Video Freeze walks.

To download this video you will see in 48 hours.
Google said on its official blog for Asia-Pacific said that this feature India, Indonesia and the Philippines have been on the YouTube app.

Mark Zuckerberg said, Facebook is not Dislike button




Facebook even the 'Dislike' button to be very demanding, but the company's CEO Mark Zuckerberg is not in favor of it. However, he said that Facebook posts are going to explore better ways to express emotions.  Facebook's headquarters Zuckerberg said during the question and answer Dislike button is a great idea and that Facebook is not working on anything. He said, "Some people have already sought Dislike button. They can say anything they want something that is not good. But we do not think it's a good thing for the world, then why are we not. "

Zuckerberg said, "I do not think Facebook needs a voting system, which was posted to the good or bad. I do not think its a great social significance or it would be good for society. " However, he pointed out that this particular system different from the Facebook Like button and still find ways to express feelings is better; Like the death of a loved one or a button on the accident is not appropriate. He said, "We are thinking of this for some time. The exact way that people can express their emotions more. They expressed surprise or laugh or anything like that. You have the option to comment, but nothing like the button should be very simple. " He added, "I want more people to the emotions, of course, but we have to find the right way, so it's good to be and not for evil. " At the end of last month, Facebook had announced the second Q & A session with the users Q & A with Mark page has asked the question. 

Google Will stop production of the Nexus 5!




If you 're thinking of buying Nexus 5 quick purchase. Indeed, Google is planning to stop production of the smartphone. However, UK even reports of some news sites that Google has stopped its production. Google Play Store is not available now call it. This phone is out of stock at Play Store. However, you can buy this phone from many online shopping sites.xus 5!

Why is closing production: Google to stop production of this new phone Nexus smartphone and tablet Nexus 6, 9, wants to focus on selling. That's why Google Nexus 5 production next year is considering closing.

Friday 12 December 2014

Malware Alert! Android Virus Steals Personal Data including Passwords

Friday 12 December 2014 - 0 Comments




Computer Emergency Response Team of India (CERT-In) has issued an advisory, warning users against a new Android virus that is out on the streets. Named as Android/SmsSend, this virus affects Android smartphones and steals personal information including sensitive data such as passwords.
Scroll further to read more about this mobile virus.

What is Android/SmsSend?

Android/SmsSend is a newly detected Trojan virus that affects Android smartphones.

What does this Virus do?

Once inside an Android device, the virus can perform the following malicious and illegal activities:

  • Sends text messages to numbers on the victim’s contact list. These messages most likely contain a link to download the virus itself, or to other threats.

Steals basic information of the infected device such as:



  1. IMEI number
  2. Device ID
  3. Device type

  • Android/SmsSend is also capable of installing spyware on the infected device, which in turn, can spy on what the user does on their phone.
  • The virus can also steal sensitive information such as:


  1. Pictures
  2. Passwords
  3. Banking information


  • The notoriety level of this virus goes up to a level where it can also track the device’s location, access text messages, crash the affected device, and even disable any firewall protection.

How does Android/SmsSend Spread?

The main source of this Android malware are unofficial, third party app stores.

What Should You Do to Avoid this Malware?



  1. Download apps only from trusted, official stores such as Google Play.
  2. Always check for permissions before installing an app. For instance, if a Flash Light app asks for your permission to use Internet or view your contacts or media, then avoid installing it.
  3. Do not click links in unknown and unexpected emails.
  4. Avoid clicking links in text messages from unknown senders. Even if the link seems to have sent by someone you know, verify it first before acting on it.
  5. Get a reliable mobile security app that performs real-time virus scan as soon as an application is installed on a device.
  6. Use the device encryption feature that is available in Android Gingerbread 2.3.4 and above. Encrypting your device will prevent a hacker from misusing your data even if they get access to it.
  7. Never log on to any website while using public, unsecured Wi-Fi networks.
  8. Regularly back up your device’s important files and keep them safe.

How does Quick Heal help?

Quick Heal mobile security app detects and blocks this Android malware from affecting your device or its data.


If you come across any incident that is related to the {Android Smssend} virus or any other malware, please do leave your comments below.

Source:
timesofindia.indiatimes.com
gadgets.ndtv.com
http://ibnlive.in.com

Smartphones are buying? Please wait for the 5




Buy mobile phone is the greatest thing that ever buy the same tension as it may be too early Outdated, because every day at the same price with more features, the handset is coming. Ashish Pandey told this race are among some of the entries in the coming days which may smartphone. Official information about some of these, so much discussion about Likes Technologies websites.

1. Xiaomi Mi 4 

China Apple called the Mi 3 Xiaomi all the old record breaking sales in India. Within a few seconds on the Internet to sell all stocks Mi 3, administered by success. It is believed that by January Mi 4 India is the heir. 5-inch screen, 441 pixels per inch glow, 3 GB RAM, 16 or 64 GB memory, 2.5 Gigahertz Qualcomm Snapdragon processor quad-core, 30-minute quick charge 60 per cent, 13-megapixel rear and 8 megapixel front camera and 3080 mAh battery that There are features. China's price less than Rs 20 per 16 GB and 64 GB model is around 24 thousand. In India, the price will be worth watching.

2. Samsung Galaxy Grand 3

-Series mid-range Samsung Galaxy Grand significantly Popular Phablet and around December to January is the time for the arrival of its successor. No official information about this right now, but still connected to it in some sites have surfaced Likes. According to them, the 5.5-inch HD screen, quad-core Snapdragon Qualcomm 64-bit processor, 1.5 GB of RAM, 5 megapixel front camera, are estimated to be 12-13 features such as megapixel rear camera. Grand 2 is compared to many feature upgrade.

3. Yu phone (Micromax)

 Micromax recently announced a new brand Yu. The announcement surprised everyone because it suddenly was signed with the US company Sayanojhen. China's new operating system, but the biggest company on Sayanojhen One Plus One Forest India was bringing your handset. Cyanogen suddenly he Micromax in India with Android based OS is exclusive deal. Then Yu was announced. Is believed that Sayanojhen based U-Phone will launch before Christmas and will be offered online by targeting the tech-friendly generation. There is no update on features and price range.

 4. Samsung Galaxy Note Edge 

As the Samsung Galaxy Note  is the first smartphone which side is bent screen on which the notification will be different. With 3 GB RAM and 32 GB inbuilt memory than 16 micro-SD card is the option of applying. The 5.6-inch Super Amoled screen, which is 551 pixels per inch Resolution. Curve or incinerate its own display is bent. 3.7 megapixel front camera, 16-megapixel rear camera, 3000mAh battery features such as make the Most Wanted. India is awaiting its launch. According to the US to become the prices are around Rs 58.

5. One Plus

Two year old company in China's smartphone One Plus One forest just launched in India, but its successor has begun discussions to One Plus. There are indications that can be launched between April-September 2015, as well as outside China since the first generation's extradition. At the moment, people are not co One Plus buy one, but what about One Plus to have leaked, according to him, instead of 16 to 32 GB memory in the base model, Qualcomm 805 Snapdragon processor, 3300mAh battery, 16-megapixel rear camera and may have features like a 5 megapixel front camera. Wait a little longer for it, then it's a big deal to get co One Plus forest. 

Wednesday 10 December 2014

Change Your Computer Processor Name Permanently

Wednesday 10 December 2014 - 0 Comments




A while ago on Tweak And Trick, I published an article on changing your processor name. But recently, Anil Kumar pointed out that the trick only changed the name temporarily.

After a user restarts his computer, the name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not have permanent results.

Thus, the alien processor name you had earlier again reverted back to the boring old one.

Problem: To, make the name change permanent, it was required to update the Processor Name String registry key every time Windows starts.

Solution: It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the Windows start up folder. To do so, just follow the steps given below:-


Steps :-
1.  Open Notepad.
2.  Copy and paste the exact code given below:-


Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="My Processor name 50000MHz"
To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Open the Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.

3.  Click on File Menu, click on Save As and select "All Types" in the Save as Type option. Save the file as Processor Name Change.reg or *.reg.
4.  Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.


5.  Copy the created Shortcut file.
6.  Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP)      or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup        (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.)       if C: is your System drive.
7.  Paste the copied file.


This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. This means that even upon restarting your computer, you will see that the changed processor name is permanent.

Enable Task Manager disabled by Administrator or by a Virus in Windows



Windows Task Manager is used to view details about processes running on your computer. Since it can be used to terminate programs that are misbehaving or are viruses disguised in the form of harmless programs, most spyware and viruses disable it to prevent themselves from being closed through it. Some administrators also disable Task Manager to prevent users from closing important security programs like antiviruses and anti-malwares.

In such situations, running the Task Manager will give the "Task Manager has been disabled by Administrator" error. However, there are some techniques you can use to re-enable task manager and close those harmful programs manually. This article contains few such simple techniques you can use to regain access to Task Managing privileges.

Enable Task Manager from Registry in Windows 8, 7, XP or Vista

Registry Editor is an inbuilt Windows tool that is used to modify registry keys which tell Windows how it should work. A simple registry modification can be used to bypass the Task Manager block. To do so, just follow the steps:-

  1. Click on Start. Go to Run. If you use Windows 8, Windows 7 or Windows Vista, go to Search.
  2. Type regedit and press Enter. Registry Editor will start. If Registry Editor is also disabled, you will first need to enable registry editing.
  3. Through the left hand navigation pane, navigate to HKEY_CURRENT_USER\Software\Microsoft\ Windows\ Current Version\Policies\System. If the System key is not there, you will need to create it.
  4. In the work area, locate "DisableTaskMgr". If this value is not there, you will need to create a new DWORD value called DisableTaskMgr. Double click on it. A window will pop up.
  5. Enter its value data as 0 and press OK.
  6. Close Registry Editor. If Task Manager is still disabled, restart your computer.


Enable Task Manager from the Group Policy Editor (Gpedit.msc)

Group Policy Editor is a feature in Windows which is used to edit local policy settings. It can also be used to enable Task Manager. To do so, just follow the steps given below:-

  1. Open Start Menu. Windows XP users click on Run. Windows 8.1, Windows 8, Windows 7 and Vista users, go to Search.
  2. Type gpedit.msc and press Enter. Group Policy Editor Window will show up.
  3. From the navigational pane at the left hand side, go to: User Configuration>Administrative Templates>System>Ctrl+Alt+Del Options.
  4. In the work area, double click on "Remove Task Manager" and set its value to Disabled or Not Configured.
  5. Restart your Computer or Log Off and Log back On to apply the changes.
  6. Group Policy Editor is not available on home editions of Windows.


Enable Task Manager by Running a CMD Command

Command Prompt can also be used to directly enable Task Manager.

  1. Open Notepad.
  2. Copy the code given below and paste it.

 REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System  /v  DisableTaskMgr  /t REG_DWORD  /d /0 /f

      3.  Save the File as TaskManager.bat.
      4.  Run TaskManager.bat as Administrator if you use Windows 8, Windows 7 or Windows Vista.In Windows XP, simply open the file. A command prompt window will flash for a second and then disappear indicating successful execution. After running the batch file, you will be able to again use Task Manager. If Task Manager is still not available, restart your computer.


Create a Registry(.reg) file for enabling Task Manager

If you are unfamiliar with manually editing the Registry, you can create a Registry file which will automatically modify the Registry Key to re-enable Task Managing. To create one such file:-

  1. Open Notepad or any other text editor.
  2. Copy the code given below and paste it as it is in it.

Windows Registry Editor Version 5.00


[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] “DisableTaskMgr” =dword:00000000


      3.  Save the file as Enable Task Manager.reg or *.reg.
      4.  Open the file by double clicking on it.
      5.  Registry Editor will ask you for confirmation. In the confirmation Window, click Yes.
      6.  Task Manager would immediately be accessible. If it is not, restart your computer.


Xolo One smartphone launch will Android 5.0 Lollipop




Xolo One smartphone was launched. Its price is Rs 6599. The most important thing is that the company said it will update Android Lollipop 5.0.

One dual-SIM Jholo Android Sport 4.4.2 KitKat is running on. The 4.5-inch display with 480 x 854 pixels Resolution. MediaTek Gigahertz 1.3 quad-core processor, Mali 400 MP2 GPU and one GB RAM.

The rear has a 5 megapixel camera with LED flash. The Scene Detection, Panorama, Geo tagging, best shot, smile shot and features such as HDR. 0.3 megapixel front camera. 8 GB and 32 GB micro-SD card internal Storage can.
The battery is 1700mAh. According to the company in charge of the one-time up to 8 hours talk time and 377 hours standby time of it.

Motorola Moto G found in India the Android 5.0 lollipop update




After a week of testing in India Motorola Moto Sock G (Jane Forest) has launched the much awaited Android version 5.0 lollipop. If your Moto G (Jane Forest) is visible in the update Notification just the 'Yes I Am the "Select and then downloaded the" Install Now "Select. Then restart your phone and your Moto G will update the OS to 220.21.16.

Motorola's Moto G (Jane Tu) still pending launch of the OS, as the company is now looking to test the model. Motorola Moto X Moto-law Jane Products soon to rest and Moto E is also planning to launch this new version.

Moto G are the new updates as new services now with flash light on the status bar now if you wish to use your phone to fit two people can make. Users of this feature, you go into the settings menu of your photo gallery and camera to the other users can limit the use of such applications.

This App make free calls to 85 countries on mobile and landlines







We even Whatsapp free from apps like how to make friends, you have to have to call us and we are troubled by the growing call rates. The service offering free calls to some app, but the other side of the app must be installed and they can not be fixed or the feature-phone call. Stop calling you a new app for free that can overcome obstacles.

The name of the app is called +. The 85 countries you can call mobile and landline phone for free. Specifically, it calls for it to be installed on the other hand it is not an app.

The app will call your number in caller ID. In this app you can call for free to anyone in the USA. 4 cities in Brazil, China and Mexico can call free on the landline.

If you in any other country, including India (or the rest of Brazil, China and Mexico on the mobile) want to call, you have 2 options. Either you offer (such as logging on to a website, complete a survey, to add) by completing the free service can take a few days, or you can pay cash for service.

Learn: The application for the special your relationship

Call + 99 cents (Rs 61 crore) a day, $ 1.99 (Rs 123 crore) in 2 days and $ 19.99 (about 1240 rupees) will be a month unlimited calling service.

This app can be downloaded for free on Android and iOS devices is.

Get Our App

Subscribe

Please Enter Your Email Id

© 2013 Blogger World. All rights reserved.
Designed by Think Exchanger